National Repository of Grey Literature 132 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Centralization of Java Security Policy Management
Kalina, Jan ; Rogalewicz, Adam (referee) ; Letko, Zdeněk (advisor)
WildFly is a platform for distributed environment which meets specification of Java Enterprise Edition. This thesis deals with possibilities of centralized management of security policies in this environment. Security policy is a set of permissions to which the Java virtual machine (JVM) limits possibilities of running applications. Just possibilities of security policy using was in WildFly so far heavily restricted. The result of the thesis are extensions of WildFly which add possibility of central deployment of security policies to individual servers, without need for restart that server, into program interface of WildFly and into WildFly management console. Part of result is also patch of core of WildFly, which solve problem of exchange security policy at runtime of JVM.
Rating of Security Business Informations
Veselý, Martin ; Nohel, Oto (referee) ; Dvořák, Jiří (advisor)
The thesis ”Rating of security business information” is focused on creating metrics in order to assess security of an information system of the company Tech4sec, spol.s.r.o. Risks of the information system and their impact on economy of the company are elaborated by application of the created metrics. To build the part of IS/IT strategy of the company that leads to elimitation of the risks found is dealt with in the thesis as well.
Draft of Information Security Methodology in Company Running Electronic Commerce
Mráčková, Kateřina ; RNDr. et RNDr. Vladimír Mazálek, PhD., DBA (referee) ; Sedlák, Petr (advisor)
The work deals with the analysis of security management in company selling goods trought the stone shop and the electronic commerce. The assets and threats affecting them were identified and an analysis of risks and selected measures was evaluated. The work is based on the theoretical background from series of standards ISO/IEC 27000 given in the first part of it.
Draft of company IS/IT security policy.
Kuliš, Ota ; Princová, Irena (referee) ; Ondrák, Viktor (advisor)
The presented bachelor's thesis analyses problems of IS/IT security in the factual environment of a middle-sized Czech company and suggests a solution to these problems and its practical implementation. Taking into account the scope of security issues, the thesis is focused on the company security policy.
A Tool for Development of OVAL Definitions within OpenSCAP Project
Černý, Jan ; Rogalewicz, Adam (referee) ; Smrčka, Aleš (advisor)
This thesis deals with the SCAP standard, used in area of computer security, and describes its open source implementation OpenSCAP. The analysis focuses on OVAL, a language for determining vulnerabilities and configuration issues on computer systems. Typical problems of OVAL are discussed. Based on obtained findings, an extension of the OpenSCAP project for reporting and diagnostics of OVAL interpretation has been designed. The thesis describes implementation, integration and testing of proposed extension.
Implementation Methodology of Network Security in the Software Company
Tomaga, Jakub ; Sopuch, Zbyněk (referee) ; Sedlák, Petr (advisor)
This thesis deals with network security and its deployment in the real environment of the software company. The thesis describes information management framework with a specific concentration on computer networks. Network security policy is designed as well as network infrastructure modifications in order to increase the level of security. All parts of the solution are also analyzed from financial point of view.
Information System Assessment and Proposal for ICT Modification
Ryšánek, Vladimír ; Hampl, Ondřej (referee) ; Koch, Miloš (advisor)
This thesis focuses on the analysis of the current state of an information system in order to detect it´s deficiencies and to propose a motion for their elimination. Via application of selected methods, it reveals lack in the system security policy, on which this thesis further focuses. Specifies how to implement asset assessment as a part of the risk management in the company and also contains its own security policy solution using Safetica software, which helps reducing the likelihood of the company security incidents.
Corporate Information Strategy
Kutnar, Petr ; Zahradníček, Pavel (referee) ; Koch, Miloš (advisor)
This thesis describes the design of an information strategy for the Faculty Hospital in Brno, which is the largest provider of health services in Moravia. The first part includes theoretical aspects used. In the following chapter, there are analyses that aim to precisely describe the current situation of the organization. The third part contains draft of a new information strategy from several perspectives. At the end of this chapter there is a detailed time analysis which uses PERT methodology. The last part evaluates the costs and benefits of new information strategy of Faculty Hospital.
GAP analysis of information security management system
Konečný, Martin ; Tomáš,, Krejčí (referee) ; Sedlák, Petr (advisor)
The master’s thesis focuses on GAP analysis of information security management system. The thesis consists of theoretical, analytical and practical part. The first part discusses the theoretical background of the issue of information and cyber security. The analytical part describes the current condition of the researched company. The thesis’s output is the draft of risk register and draft of security countermeasures implementation. The draft targets on countermeasures leading to increase information security in company.
Corporate Network Monitoring Concept
Hopp, Jiří ; Aleš,, ŠPIDLA (referee) ; Ondrák, Viktor (advisor)
The bachelor’s thesis analyzes the state of cybersecurity events monitoring in the institution and the security policies of the institution. Based on the analysis suggests updates of the settings of cybersecurity monitoring systems, changes of the security policies, and other steps to increase the state of information security and information systems security in the institution.

National Repository of Grey Literature : 132 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.